Jens Kneifel, R. Roj, H. Woyand, R. Theiss, P. Dültgen
This publication presents the development of an Industrial-Internet-of-Things device. The device is capable of completing several tasks, such as the acquisition of high-frequency measurement data and evaluating data via machine learning methods in an artificial intelligence application. The installed measurement technology generates data which is comparable to data generated by costly laboratory equipment, meaning that it can be used as a low-budget and open-source alternative. A workflow method has been designed that promotes experimental work and simplifies the effort required to implement artificial intelligence solutions. At the end of this paper, the results of the experiment, which aimed to collect measurement data, extract suitable features, and train artificial intelligence models, are presented. Techniques from vibration analysis were used for feature extraction, and concepts for the extrapolation and enhancement of data sets were investigated. The test results have proven that the development is comparable with high-end laboratory equipment. The created application has demonstrated sufficient accuracy in predictions, and the designed process can be used for arbitrary, artificial intelligence-based rapid prototyping.
{"title":"An IIoT-Device for Acquisition and Analysis of High-Frequency Data Processed by Artificial Intelligence","authors":"Jens Kneifel, R. Roj, H. Woyand, R. Theiss, P. Dültgen","doi":"10.3390/iot4030013","DOIUrl":"https://doi.org/10.3390/iot4030013","url":null,"abstract":"This publication presents the development of an Industrial-Internet-of-Things device. The device is capable of completing several tasks, such as the acquisition of high-frequency measurement data and evaluating data via machine learning methods in an artificial intelligence application. The installed measurement technology generates data which is comparable to data generated by costly laboratory equipment, meaning that it can be used as a low-budget and open-source alternative. A workflow method has been designed that promotes experimental work and simplifies the effort required to implement artificial intelligence solutions. At the end of this paper, the results of the experiment, which aimed to collect measurement data, extract suitable features, and train artificial intelligence models, are presented. Techniques from vibration analysis were used for feature extraction, and concepts for the extrapolation and enhancement of data sets were investigated. The test results have proven that the development is comparable with high-end laboratory equipment. The created application has demonstrated sufficient accuracy in predictions, and the designed process can be used for arbitrary, artificial intelligence-based rapid prototyping.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87516084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gilroy P. Pereira, Mohamed Zied Chaari, Fawwad Daroge
Agriculture, or farming, is the science of cultivating the soil, growing crops, and raising livestock. Ever since the days of the first plow from sticks over ten thousand years ago, agriculture has always depended on technology. As technology and science improved, so did the scale at which farming was possible. With the popularity and growth of the Internet of Things (IoT) in recent years, there are even more avenues for technology to make agriculture more efficient and help farmers in every nation. In this paper, we designed a smart IoT-enabled drip irrigation system using ESP32 to automate the irrigation process, and we tested it. The ESP32 communicates with the Blynk app, which is used to collect irrigation data, manually water the plants, switch off the automatic watering function, and plot graphs based on the readings of the sensors. We connected the ESP32 to a soil moisture sensor, temperature sensor, air humidity sensor, and water flow sensor. The ESP32 regularly checks if the soil is dry. If the soil is dry and the soil temperature is appropriate for watering, the ESP32 opens a solenoid valve and waters the plants. The amount of time to run the drip irrigation system is determined based on the flow rate measured by the water flow sensor. The ESP32 reads the humidity sensor values and notifies the user when the humidity is too high or too low. The user can switch off the automatic watering system according to the humidity value. In both primary and field tests, we found that the system ran well and was able to grow green onions.
{"title":"IoT-Enabled Smart Drip Irrigation System Using ESP32","authors":"Gilroy P. Pereira, Mohamed Zied Chaari, Fawwad Daroge","doi":"10.3390/iot4030012","DOIUrl":"https://doi.org/10.3390/iot4030012","url":null,"abstract":"Agriculture, or farming, is the science of cultivating the soil, growing crops, and raising livestock. Ever since the days of the first plow from sticks over ten thousand years ago, agriculture has always depended on technology. As technology and science improved, so did the scale at which farming was possible. With the popularity and growth of the Internet of Things (IoT) in recent years, there are even more avenues for technology to make agriculture more efficient and help farmers in every nation. In this paper, we designed a smart IoT-enabled drip irrigation system using ESP32 to automate the irrigation process, and we tested it. The ESP32 communicates with the Blynk app, which is used to collect irrigation data, manually water the plants, switch off the automatic watering function, and plot graphs based on the readings of the sensors. We connected the ESP32 to a soil moisture sensor, temperature sensor, air humidity sensor, and water flow sensor. The ESP32 regularly checks if the soil is dry. If the soil is dry and the soil temperature is appropriate for watering, the ESP32 opens a solenoid valve and waters the plants. The amount of time to run the drip irrigation system is determined based on the flow rate measured by the water flow sensor. The ESP32 reads the humidity sensor values and notifies the user when the humidity is too high or too low. The user can switch off the automatic watering system according to the humidity value. In both primary and field tests, we found that the system ran well and was able to grow green onions.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82358954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Farjana, Abubakar Fahad, Syed Eftasum Alam, Md. Motaharul Islam
IoT-based smart e-waste management is an emerging field that combines technology and environmental sustainability. E-waste is a growing problem worldwide, as discarded electronics can have negative impacts on the environment and public health. In this paper, we have proposed a smart e-waste management system. This system uses IoT devices and sensors to monitor and manage the collection, sorting, and disposal of e-waste. The IoT devices in this system are typically embedded with sensors that can detect and monitor the amount of e-waste in a given area. These sensors can provide real-time data on e-waste, which can then be used to optimize collection and disposal processes. E-waste is like an asset to us in most cases; as it is recyclable, using it in an efficient manner would be a perk. By employing machine learning to distinguish e-waste, we can contribute to separating metallic and plastic components, the utilization of pyrolysis to transform plastic waste into bio-fuel, coupled with the generation of bio-char as a by-product, and the repurposing of metallic portions for the development of solar batteries. We can optimize its use and also minimize its environmental impact; it presents a promising avenue for sustainable waste management and resource recovery. Our proposed system also uses cloud-based platforms to help analyze patterns and trends in the data. The Autoregressive Integrated Moving Average, a statistical method used in the cloud, can provide insights into future garbage levels, which can be useful for optimizing waste collection schedules and improving the overall process.
{"title":"An IoT- and Cloud-Based E-Waste Management System for Resource Reclamation with a Data-Driven Decision-Making Process","authors":"M. Farjana, Abubakar Fahad, Syed Eftasum Alam, Md. Motaharul Islam","doi":"10.3390/iot4030011","DOIUrl":"https://doi.org/10.3390/iot4030011","url":null,"abstract":"IoT-based smart e-waste management is an emerging field that combines technology and environmental sustainability. E-waste is a growing problem worldwide, as discarded electronics can have negative impacts on the environment and public health. In this paper, we have proposed a smart e-waste management system. This system uses IoT devices and sensors to monitor and manage the collection, sorting, and disposal of e-waste. The IoT devices in this system are typically embedded with sensors that can detect and monitor the amount of e-waste in a given area. These sensors can provide real-time data on e-waste, which can then be used to optimize collection and disposal processes. E-waste is like an asset to us in most cases; as it is recyclable, using it in an efficient manner would be a perk. By employing machine learning to distinguish e-waste, we can contribute to separating metallic and plastic components, the utilization of pyrolysis to transform plastic waste into bio-fuel, coupled with the generation of bio-char as a by-product, and the repurposing of metallic portions for the development of solar batteries. We can optimize its use and also minimize its environmental impact; it presents a promising avenue for sustainable waste management and resource recovery. Our proposed system also uses cloud-based platforms to help analyze patterns and trends in the data. The Autoregressive Integrated Moving Average, a statistical method used in the cloud, can provide insights into future garbage levels, which can be useful for optimizing waste collection schedules and improving the overall process.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79025921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions. Numerical evaluations for the performance and the optimization problem are provided for further understanding of the analysis. The modeling and analysis, as well as the optimization design method, are expected to provide a useful reference for the design and evaluation of fog computing systems.
{"title":"Performance Modeling and Optimization for a Fog-Based IoT Platform","authors":"Shensheng Tang","doi":"10.3390/iot4020010","DOIUrl":"https://doi.org/10.3390/iot4020010","url":null,"abstract":"A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions. Numerical evaluations for the performance and the optimization problem are provided for further understanding of the analysis. The modeling and analysis, as well as the optimization design method, are expected to provide a useful reference for the design and evaluation of fog computing systems.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"308 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79912147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. O. Affia, Hilary Finch, Woosub Jung, I. Samori, Lucas Potter, X. Palmer
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century.
{"title":"IoT Health Devices: Exploring Security Risks in the Connected Landscape","authors":"A. O. Affia, Hilary Finch, Woosub Jung, I. Samori, Lucas Potter, X. Palmer","doi":"10.3390/iot4020009","DOIUrl":"https://doi.org/10.3390/iot4020009","url":null,"abstract":"The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73084452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier of fog computing can reduce expensive latency by bringing storage, processing, and networking closer to sensor nodes. Due to the growing variety of medical data and service types, there is a crucial need for efficient and secure architecture for sensor-based health-monitoring devices connected to fog nodes. In this paper, we present publish/subscribe and interest/resource-based non-DHT-based peer-to-peer (P2P) RC-based architecture for resource discovery. The publish/subscribe communication model provides a scalable way to handle large volumes of data and messages in real time, while allowing fine-grained access control to messages, thus enabling heightened security. Our two − level overlay network consists of (1) a transit ring containing group-heads representing a particular resource type, and (2) a completely connected group of peers. Our theoretical analysis shows that our search latency is independent of the number of peers. Additionally, the complexity of the intra-group data-lookup protocol is constant, and the complexity of the inter-group data lookup is O(n), where n is the total number of resource types present in the network. Overall, it therefore allows the system to handle large data throughput in a flexible, cost-effective, and secure way for medical IoT systems.
{"title":"Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0","authors":"Indranil Roy, Reshmi Mitra, Nick Rahimi, B. Gupta","doi":"10.3390/iot4020008","DOIUrl":"https://doi.org/10.3390/iot4020008","url":null,"abstract":"Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier of fog computing can reduce expensive latency by bringing storage, processing, and networking closer to sensor nodes. Due to the growing variety of medical data and service types, there is a crucial need for efficient and secure architecture for sensor-based health-monitoring devices connected to fog nodes. In this paper, we present publish/subscribe and interest/resource-based non-DHT-based peer-to-peer (P2P) RC-based architecture for resource discovery. The publish/subscribe communication model provides a scalable way to handle large volumes of data and messages in real time, while allowing fine-grained access control to messages, thus enabling heightened security. Our two − level overlay network consists of (1) a transit ring containing group-heads representing a particular resource type, and (2) a completely connected group of peers. Our theoretical analysis shows that our search latency is independent of the number of peers. Additionally, the complexity of the intra-group data-lookup protocol is constant, and the complexity of the inter-group data lookup is O(n), where n is the total number of resource types present in the network. Overall, it therefore allows the system to handle large data throughput in a flexible, cost-effective, and secure way for medical IoT systems.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"117 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80988066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Inshi, Rasel Chowdhury, Hakima Ould-Slimane, C. Talhi
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today’s increasing security risks in the emerging cloud technologies, which share massive data capabilities and impose regulation requirements on privacy, as well as the emergence of new multiuser, multiprofile, and multidevice technologies, there is a growing need for new approaches to address the new challenges of autonomous context awareness and its fine-grained security-enforcement models. The solutions proposed in this work aim to extend our previous LCA-ABE work to provide an intelligent, dynamic creation of context-aware policies, which has been achieved through deploying smart-learning techniques. It also provides data consent, automated access control, and secure end-to-end communications by leveraging attribute-based encryption (ABE). Moreover, our policy-driven orchestration model is able to achieve an efficient, real-time enforcement of authentication and authorization (AA) as well as federation services between users, service providers, and connected devices by aggregating, modelling, and reasoning context information and then updating consent accordingly in autonomous ways. Furthermore, our framework ensures that the accuracy of our algorithms is above 90% and their precision is around 85%, which is considerably high compared to the other reviewed approaches. Finally, the solution fulfills the newly imposed privacy regulations and leverages the full power of IoT smart environments.
{"title":"Secure Adaptive Context-Aware ABE for Smart Environments","authors":"S. Inshi, Rasel Chowdhury, Hakima Ould-Slimane, C. Talhi","doi":"10.3390/iot4020007","DOIUrl":"https://doi.org/10.3390/iot4020007","url":null,"abstract":"Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today’s increasing security risks in the emerging cloud technologies, which share massive data capabilities and impose regulation requirements on privacy, as well as the emergence of new multiuser, multiprofile, and multidevice technologies, there is a growing need for new approaches to address the new challenges of autonomous context awareness and its fine-grained security-enforcement models. The solutions proposed in this work aim to extend our previous LCA-ABE work to provide an intelligent, dynamic creation of context-aware policies, which has been achieved through deploying smart-learning techniques. It also provides data consent, automated access control, and secure end-to-end communications by leveraging attribute-based encryption (ABE). Moreover, our policy-driven orchestration model is able to achieve an efficient, real-time enforcement of authentication and authorization (AA) as well as federation services between users, service providers, and connected devices by aggregating, modelling, and reasoning context information and then updating consent accordingly in autonomous ways. Furthermore, our framework ensures that the accuracy of our algorithms is above 90% and their precision is around 85%, which is considerably high compared to the other reviewed approaches. Finally, the solution fulfills the newly imposed privacy regulations and leverages the full power of IoT smart environments.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80600683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a certain degree of order. However, with the increasing complexity of networks and the diversity of attack types, existing studies use a single entropy, which does not discriminate correctly between attacks and normal traffic and may lead to false positives. In this paper, we propose new state determination standards that use the normal distribution characteristics of the entropy value at the time which an attack did not occur, subdivide the normal and abnormal range represented by the entropy value, improving the accuracy of attack determination. Furthermore, we show the effectiveness of the proposed method by numerical analysis.
{"title":"A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic","authors":"Qiwen Tian, S. Miyata","doi":"10.3390/iot4020006","DOIUrl":"https://doi.org/10.3390/iot4020006","url":null,"abstract":"To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a certain degree of order. However, with the increasing complexity of networks and the diversity of attack types, existing studies use a single entropy, which does not discriminate correctly between attacks and normal traffic and may lead to false positives. In this paper, we propose new state determination standards that use the normal distribution characteristics of the entropy value at the time which an attack did not occur, subdivide the normal and abnormal range represented by the entropy value, improving the accuracy of attack determination. Furthermore, we show the effectiveness of the proposed method by numerical analysis.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87157614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Home appliance manufacturers have been adding Wi-Fi modules and sensors to devices to make them ‘smart’ since the early 2010s. However, consumers are still largely unaware of what kind of sensors are used in these devices. In fact, they usually do not even realize that smart devices require an interaction of hardware and software since the smart device software is not immediately apparent. In this paper, we explore how providing additional information on these misunderstood smart device features (such as lists of sensors, software updates, and warranties) can influence consumers’ purchase decisions. We analyze how additional information on software update warranty (SUW) and the type of sensors in smart devices (which draw attention to potential financial and privacy risks) mediates consumer purchase behavior. We also examine how other moderators, such as brand trust and product price, affect consumers’ purchase decisions when considering which smart product option to buy. In the first qualitative user study, we conducted interviews with 20 study participants, and the results show that providing additional information about software updates and lists of sensors had a significant impact on consumer purchase preference. In our second quantitative study, we surveyed 323 participants to determine consumers’ willingness to pay for a SUW. From this, we saw that users were more willing to pay for Lifetime SUW on a smart TV than to pay for a 5-year SUW. These results provide important information to smart device manufacturers and designers on elements that improve trust in their brand, thus increasing the likelihood that consumers will purchase their smart devices. Furthermore, addressing the general consumer smart device knowledge gap by providing this relevant information could lead to a significant increase in consumer adoption of smart products overall, which would benefit the industry as a whole.
{"title":"Evaluating Consumer Behavior, Decision Making, Risks, and Challenges for Buying an IoT Product","authors":"M. Nasirinejad, S. Sampalli","doi":"10.3390/iot4020005","DOIUrl":"https://doi.org/10.3390/iot4020005","url":null,"abstract":"Home appliance manufacturers have been adding Wi-Fi modules and sensors to devices to make them ‘smart’ since the early 2010s. However, consumers are still largely unaware of what kind of sensors are used in these devices. In fact, they usually do not even realize that smart devices require an interaction of hardware and software since the smart device software is not immediately apparent. In this paper, we explore how providing additional information on these misunderstood smart device features (such as lists of sensors, software updates, and warranties) can influence consumers’ purchase decisions. We analyze how additional information on software update warranty (SUW) and the type of sensors in smart devices (which draw attention to potential financial and privacy risks) mediates consumer purchase behavior. We also examine how other moderators, such as brand trust and product price, affect consumers’ purchase decisions when considering which smart product option to buy. In the first qualitative user study, we conducted interviews with 20 study participants, and the results show that providing additional information about software updates and lists of sensors had a significant impact on consumer purchase preference. In our second quantitative study, we surveyed 323 participants to determine consumers’ willingness to pay for a SUW. From this, we saw that users were more willing to pay for Lifetime SUW on a smart TV than to pay for a 5-year SUW. These results provide important information to smart device manufacturers and designers on elements that improve trust in their brand, thus increasing the likelihood that consumers will purchase their smart devices. Furthermore, addressing the general consumer smart device knowledge gap by providing this relevant information could lead to a significant increase in consumer adoption of smart products overall, which would benefit the industry as a whole.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77177246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanjeev Shakya, A. Taparugssanagorn, Chaklam Silpasuwanchai
Gait analysis is a powerful technique that detects and identifies foot disorders and walking irregularities, including pronation, supination, and unstable foot movements. Early detection can help prevent injuries, correct walking posture, and avoid the need for surgery or cortisone injections. Traditional gait analysis methods are expensive and only available in laboratory settings, but new wearable technologies such as AI and IoT-based devices, smart shoes, and insoles have the potential to make gait analysis more accessible, especially for people who cannot easily access specialized facilities. This research proposes a novel approach using IoT, edge computing, and tiny machine learning (TinyML) to predict gait patterns using a microcontroller-based device worn on a shoe. The device uses an inertial measurement unit (IMU) sensor and a TinyML model on an advanced RISC machines (ARM) chip to classify and predict abnormal gait patterns, providing a more accessible, cost-effective, and portable way to conduct gait analysis.
{"title":"Convolutional Neural Network-Based Low-Powered Wearable Smart Device for Gait Abnormality Detection","authors":"Sanjeev Shakya, A. Taparugssanagorn, Chaklam Silpasuwanchai","doi":"10.3390/iot4020004","DOIUrl":"https://doi.org/10.3390/iot4020004","url":null,"abstract":"Gait analysis is a powerful technique that detects and identifies foot disorders and walking irregularities, including pronation, supination, and unstable foot movements. Early detection can help prevent injuries, correct walking posture, and avoid the need for surgery or cortisone injections. Traditional gait analysis methods are expensive and only available in laboratory settings, but new wearable technologies such as AI and IoT-based devices, smart shoes, and insoles have the potential to make gait analysis more accessible, especially for people who cannot easily access specialized facilities. This research proposes a novel approach using IoT, edge computing, and tiny machine learning (TinyML) to predict gait patterns using a microcontroller-based device worn on a shoe. The device uses an inertial measurement unit (IMU) sensor and a TinyML model on an advanced RISC machines (ARM) chip to classify and predict abnormal gait patterns, providing a more accessible, cost-effective, and portable way to conduct gait analysis.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88534587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}